General

  • Target

    tmp

  • Size

    337KB

  • Sample

    220309-rxayrscbam

  • MD5

    d6cb6f4304865dcfc312a32d1f2e7880

  • SHA1

    e96f64cec39d44a820d637bdd522d3a8e71d854f

  • SHA256

    f1b06407f8fe5e17a2bca06f7c7d54711f41df69163f3e9027c7521c0b17a864

  • SHA512

    948569df69e08ab6cc8e01dcb0301aa40a9832d96b350d13e2bfd84ec56f66f401ce902f7c3774bee0b371a345804b3607eea6047d53ffd979a448acd4a1730c

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p2a5

Decoy

gorillaslovebananas.com

zonaextasis.com

digitalpravin.online

memorialdoors.com

departmenteindhoven.com

vipulb.com

ruyibao365.com

ynpzz.com

matthewandjessica.com

winfrey2024.com

janetride.com

arairazur.xyz

alltheheads.com

amayawebdesigns.com

califunder.com

blacksource.xyz

farmasi.agency

ilmkibahar.com

thinkcentury.net

eskortclub.com

Targets

    • Target

      tmp

    • Size

      337KB

    • MD5

      d6cb6f4304865dcfc312a32d1f2e7880

    • SHA1

      e96f64cec39d44a820d637bdd522d3a8e71d854f

    • SHA256

      f1b06407f8fe5e17a2bca06f7c7d54711f41df69163f3e9027c7521c0b17a864

    • SHA512

      948569df69e08ab6cc8e01dcb0301aa40a9832d96b350d13e2bfd84ec56f66f401ce902f7c3774bee0b371a345804b3607eea6047d53ffd979a448acd4a1730c

    • Xloader

      Xloader is a rebranded version of Formbook malware.

    • suricata: ET MALWARE FormBook CnC Checkin (GET)

      suricata: ET MALWARE FormBook CnC Checkin (GET)

    • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

      suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    • Xloader Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks